Back to Results
First PageMeta Content
Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing


How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il
Add to Reading List

Document Date: 2014-09-01 09:06:37


Open Document

File Size: 369,94 KB

Share Result on Facebook

City

Scottsdale / /

Company

Computer-Communication Networks / /

Country

United States / /

Currency

pence / USD / /

/

Event

FDA Phase / Product Recall / Product Issues / Product Release / /

IndustryTerm

malicious server / secure protocols / uses algorithm / constant round protocol / semihonest garbled circuit protocol / unfair secure computation protocol / secure computation protocols / verifiable covert secure protocols / non-uniform polynomial-time algorithm / randomized key generation algorithm / incentivizable protocol / bounty protocol / above solution / garbled circuit computing Φx / fair protocols / naïve solution / secure computation protocol / polynomial-time algorithms / lottery protocols / probabilistic polynomialtime n-party protocol / secure protocol / deterministic verification algorithm / reputation systems / computation protocol / optimistic protocols / tion algorithm / deterministic worker algorithm / bounty maker / /

OperatingSystem

DoS / /

Organization

Pi / Clearly / g20 / Pj / Technion / /

Person

Tokenj / C. Furthermore / Keywords Bitcoin / Iddo Bentov Technion / Ranjit Kumaresan / /

Position

extractor / trusted arbiter/supervisor / malicious miner / collector / miner / PPT extractor / bounty collector / General / wB / circuit evaluator / malicious worker / candidate / /

Product

FexitCR / leak / Huang / FCR / SHA256d / P1 / P2 / FOT / /

ProvinceOrState

Arizona / /

Technology

tion algorithm / DualEx protocol / probabilistic polynomialtime n-party protocol / three polynomial-time algorithms / secure computation protocols / unfair secure computation protocol / extractable witness encryption / bounty protocol / incentivizable protocol / two protocols / following two polynomial-time algorithms / secure computation protocol / Bitcoin protocol / semihonest garbled circuit protocol / 1 uses algorithm / Verify algorithm / encryption / cryptography / Compute algorithm / KeyGen algorithm / deterministic verification algorithm / unfair secure MPC protocol / deterministic worker algorithm / Our protocol / witness encryption / constant round protocol / computation protocol / lottery protocols / time-locked encryption / simulation / non-uniform polynomial-time algorithm / secure protocol / randomized key generation algorithm / publicly verifiable covert secure protocols / design protocols / /

URL

http /

SocialTag